Smashing Magazine | Web Design & Development
Making an application work offline can be a daunting task. In this article, Matthew Andrews, a lead developer behind FT Labs, shares a few insights he had learned along the way while build
Lately, every app is "beautiful". If you read tech news, you’ve seen this pageant: Beautiful charts and graphs. Beautiful stories. Beautiful texting. Beautiful notebooks. Beautiful batte
We always try our best to challenge your artistic abilities and produce some interesting, beautiful and creative artwork. And as designers we usually turn to different sources of inspirati
To badge or not to badge? That is the question. Because badges — and a lot of stuff designed for conferences — often look the same. But if you have a little, different conferen
Responsive web design has become the dominant method of developing and designing websites. It makes it easier to think “mobile first” and to create a website that is viewable on mobile
456 Berea St. | Web Standards
Most web developers currently use vendor prefixes in CSS to enable certain features in some browsers. That’s fine, but sometimes I see code examples and prefix-adding tools that go a bit overboard w
In a couple of recent projects I’ve faced designs where the main navigation bar gave me more trouble than usual. These are the prerequisites that make the problem tricky to solve: The navbar is
Over six years ago I wrote a short post about preventing HTML tables from becoming too wide. The solutions I offered in that post involve using table-layout:fixed to lock down the width of tables. Whi
When trying to force an element to always extend to the height of its parent I ran into some peculiar browser behaviour that I thought was worth mentioning. Here’s the situation: The parent eleme
Allowing images to scale along with their container is an important part of responsive web design (and was so even before the term “responsive web design” existed). It’s really quite easy – al
W3C | Web Standards
The HTML Working Group has published two documents today: A Working Draft of Encrypted Media Extensions. This proposal extends HTMLMediaElement providing APIs to control playback of protected content.
The Device APIs Working Group has published a Last Call Working Draft of Battery Status API. This specification defines an API that provides information about the battery status of the hosting device.
The Linked Data Platform (LDP) Working Group has published a Group Note of Linked Data Platform Best Practices and Guidelines. This document provides best practices and guidelines for implementing Lin
The Cascading Style Sheets (CSS) Working Group and the SVG Working Group invite implementation of the Candidate Recommendation of CSS Masking Module Level 1. CSS Masking provides two means for partial
The Cascading Style Sheets (CSS) Working Group has published a Last Call Working Draft of CSS Counter Styles Level 3. This module introduces the @counter-style rule, which allows authors to define the
CMS Wire | Content Management
Jumpin’ Jehoshaphat, Batman! Looks like Microsoft is defending email privacy. This, after it confirmed over the weekend that it would not be handing over email data to US federal regulato
Digital marketing and sales provider iPipeline has announced an alliance with Salesforce.com that will provide sales agents across the enterprise with one-stop access to iPipeline’s integrated s
How do you become a digital business? You may discover many different paths to success on your digital journey, and even more opportunities to take a wrong turn along the way. Here are three traps to
The basis of the customer decision journey is that the customer follows a decision path that leads to a purchase. Vendors provide small pokes, prods and nudges along the way, often in the form of enga
Traditional identity and access management strategies aren’t enough anymore. As modern threats continue to emerge and evolve, organizations need a multitude of authentication technologies to con
Search Engine Watch | SEO
Three federal agencies have issued a warning that malicious cyber actors can use advanced search techniques to discover sensitive information on websites.
The tool will allow users to search for keywords in posts they are "in the audience for" on Facebook, the social network says.
If you're going to act like it's 2011, Google will treat you like it's 2011.
Google has once again updated its guidelines to cite low-quality guest posts as a form of thin or unoriginal content. How can you make sure your links are safe?
There are bad websites in the network, yes. There can be issues with junk lead submissions, yes. But for all the bad, there is a lot of good. You just have to be willing to work for it!